Vulnerabilities > Microsoft > Windows

DATE CVE VULNERABILITY TITLE RISK
2014-05-14 CVE-2014-0522 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Adobe Acrobat and Acrobat Reader
Adobe Reader and Acrobat 10.x before 10.1.10 and 11.x before 11.0.07 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0523, CVE-2014-0524, and CVE-2014-0526.
network
low complexity
adobe apple microsoft CWE-119
critical
10.0
2014-05-14 CVE-2014-0521 Information Exposure vulnerability in Adobe Acrobat and Acrobat Reader
Adobe Reader and Acrobat 10.x before 10.1.10 and 11.x before 11.0.07 on Windows and OS X do not properly implement JavaScript APIs, which allows remote attackers to obtain sensitive information via a crafted PDF document.
4.3
2014-05-14 CVE-2014-0520 Permissions, Privileges, and Access Controls vulnerability in Adobe AIR and Flash Player
Adobe Flash Player before 13.0.0.214 on Windows and OS X and before 11.2.202.359 on Linux, Adobe AIR SDK before 13.0.0.111, and Adobe AIR SDK & Compiler before 13.0.0.111 allow attackers to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2014-0517, CVE-2014-0518, and CVE-2014-0519.
network
low complexity
adobe apple microsoft linux CWE-264
7.5
2014-05-14 CVE-2014-0519 Permissions, Privileges, and Access Controls vulnerability in Adobe AIR and Flash Player
Adobe Flash Player before 13.0.0.214 on Windows and OS X and before 11.2.202.359 on Linux, Adobe AIR SDK before 13.0.0.111, and Adobe AIR SDK & Compiler before 13.0.0.111 allow attackers to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2014-0517, CVE-2014-0518, and CVE-2014-0520.
network
low complexity
adobe apple microsoft linux CWE-264
7.5
2014-05-14 CVE-2014-0518 Permissions, Privileges, and Access Controls vulnerability in Adobe AIR and Flash Player
Adobe Flash Player before 13.0.0.214 on Windows and OS X and before 11.2.202.359 on Linux, Adobe AIR SDK before 13.0.0.111, and Adobe AIR SDK & Compiler before 13.0.0.111 allow attackers to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2014-0517, CVE-2014-0519, and CVE-2014-0520.
network
low complexity
adobe apple microsoft linux CWE-264
7.5
2014-05-14 CVE-2014-0517 Permissions, Privileges, and Access Controls vulnerability in Adobe AIR and Flash Player
Adobe Flash Player before 13.0.0.214 on Windows and OS X and before 11.2.202.359 on Linux, Adobe AIR SDK before 13.0.0.111, and Adobe AIR SDK & Compiler before 13.0.0.111 allow attackers to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2014-0518, CVE-2014-0519, and CVE-2014-0520.
network
low complexity
adobe apple microsoft linux CWE-264
7.5
2014-05-14 CVE-2014-0516 Permissions, Privileges, and Access Controls vulnerability in Adobe AIR and Flash Player
Adobe Flash Player before 13.0.0.214 on Windows and OS X and before 11.2.202.359 on Linux, Adobe AIR SDK before 13.0.0.111, and Adobe AIR SDK & Compiler before 13.0.0.111 allow remote attackers to bypass the Same Origin Policy via unspecified vectors.
network
low complexity
adobe apple microsoft linux CWE-264
7.5
2014-04-30 CVE-2014-1528 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in multiple products
The sse2_composite_src_x888_8888 function in Pixman, as used in Cairo in Mozilla Firefox 28.0 and SeaMonkey 2.25 on Windows, allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write and application crash) by painting on a CANVAS element.
10.0
2014-04-29 CVE-2014-0515 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Adobe Flash Player
Buffer overflow in Adobe Flash Player before 11.7.700.279 and 11.8.x through 13.0.x before 13.0.0.206 on Windows and OS X, and before 11.2.202.356 on Linux, allows remote attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in April 2014.
network
low complexity
adobe linux apple microsoft CWE-119
critical
10.0
2014-04-18 CVE-2014-2522 Improper Input Validation vulnerability in Haxx Curl and Libcurl
curl and libcurl 7.27.0 through 7.35.0, when running on Windows and using the SChannel/Winssl TLS backend, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate when accessing a URL that uses a numerical IP address, which allows man-in-the-middle attackers to spoof servers via an arbitrary valid certificate.
network
high complexity
haxx microsoft CWE-20
4.0